What can an organisation do to protect itself from malware such as Flame? One area is maintaining vigilance though imparting awareness of the issues among staff.

Download this free guide

The importance of web security

Join us as we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.

By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

As with any awareness initiative, it must be continuous, not a one-off exercise.

Such an awareness initiative must caution staff about the use of USB devices, as that is one route that malware such as Flame can enter a company's systems. For example, warn staff that only company-issued USB devices may be connected to a company PC.

Another is about opening attachments or clicking links in e-mails from unexpected sources (are you expecting a file from a mate? No? Be cautious, call the mate and confirm before opening), manually type a URL in a browser and not click a link, be cautious about the use of shortened URLs and if in an e-mail from an unknown source, don't use.

Read more about Flame

Be vigilant about network and server resources as high CPU or disk loading or heavy internet traffic outbound or poor network response at times of the day when not expected – these may be the only indications that your systems have been infected with malware such as Flame.

Other things a company can do is to better utilise the functionality available in operating systems, particularly for USB port control, and to put together comprehensive firewall rule sets that control outbound traffic as well as inbound traffic (e.g. only open specific outbound ports from specific machines such as proxy servers).

Peter Wenham is a committee member of the BCS Security Forum strategic panel and director of information assurance consultancy Trusted Management.

0 comments

Register

Login

Forgot your password?

Your password has been sent to:

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy